Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers

被引:25
作者
Alasmary, Hisham [1 ,2 ]
Abusnaina, Ahmed [1 ]
Jang, Rhongho [1 ]
Abuhamad, Mohammed [1 ]
Anwar, Afsah [1 ]
Nyang, DaeHun [3 ]
Mohaisen, David [1 ]
机构
[1] Univ Cent Florida, Orlando, FL 32816 USA
[2] King Khalid Univ, Abha, Saudi Arabia
[3] Ewha Womans Univ, Seoul, South Korea
来源
2020 IEEE 40TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS) | 2020年
关键词
Internet of Things; Adversarial Machine Learning; Malware Detection; Deep Learning;
D O I
10.1109/ICDCS47774.2020.00089
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Deep learning algorithms have been widely used for security applications, including malware detection and classification. Recent results have shown that those algorithms are vulnerable to adversarial examples, whereby a small perturbation in the input sample may result in misclassification. In this paper, we systematically tackle the problem of adversarial examples detection in the control flow graph (CFG) based classifiers for malware detection using Soteria. Unique to Soteria, we use both density-based and level-based labels for CFG labeling to yield a consistent representation, a random walk-based traversal approach for feature extraction, and n-gram based module for feature representation. End-to-end, Soteria's representation ensures a simple yet powerful randomization property of the used classification features, making it difficult even for a powerful adversary to launch a successful attack. Soteria also employs a deep learning approach, consisting of an auto-encoder for detecting adversarial examples, and a CNN architecture for detecting and classifying malware samples. We evaluate the performance of Soteria, using a large dataset consisting of 16,814 IoT samples, and demonstrate its superiority in comparison with state-of-the-art approaches. In particular, Soteria yields an accuracy rate of 97.79% for detecting AEs, and 99.91% overall accuracy for classification malware families.
引用
收藏
页码:888 / 898
页数:11
相关论文
共 40 条
  • [1] Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems
    Abusnaina, Ahmed
    Khormali, Aminollah
    Alasmary, Hisham
    Park, Jeman
    Anwar, Afsah
    Mohaisen, Aziz
    [J]. 2019 39TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2019), 2019, : 1296 - 1305
  • [2] A framework for metamorphic malware analysis and real-time detection
    Alam, Shahid
    Horspool, R. Nigel
    Traore, Issa
    Sogukpinar, Ibrahim
    [J]. COMPUTERS & SECURITY, 2015, 48 : 212 - 233
  • [3] Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach
    Alasmary, Hisham
    Khormali, Aminollah
    Anwar, Afsah
    Park, Jeman
    Choi, Jinchun
    Abusnaina, Ahmed
    Awad, Amro
    Nyang, Daehun
    Mohaisen, Aziz
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) : 8977 - 8988
  • [4] [Anonymous], 6 INT C LEARN REPR I
  • [5] [Anonymous], 2016, P NETW DISTR SYST SE, DOI DOI 10.14722/NDSS.2016.23115
  • [6] [Anonymous], 2017, 5 INT C LEARN REPR I
  • [7] [Anonymous], 2019, DEVELOPERS
  • [8] Antonakakis M., 2012, 21 USENIX SEC S, V12, P491
  • [9] Bruschi D, 2006, LECT NOTES COMPUT SC, V4064, P129
  • [10] Towards Evaluating the Robustness of Neural Networks
    Carlini, Nicholas
    Wagner, David
    [J]. 2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 39 - 57